Sciweavers

863 search results - page 12 / 173
» A goal-oriented web browser
Sort
View
72
Voted
DIMVA
2009
14 years 10 months ago
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications
We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and f...
Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael ...
BIOSIG
2008
159views Biometrics» more  BIOSIG 2008»
14 years 11 months ago
TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management
: Federated Single-Sign-On using web browsers as User Agents becomes increasingly important. However, current proposals require substantial changes in the implementation of the Rel...
Bud P. Bruegger, Detlef Hühnlein, Jörg S...
OTM
2005
Springer
15 years 2 months ago
Accessing X Applications over the World-Wide Web
Abstract. The X Protocol, an asynchronous network protocol, was developed at MIT amid the need to provide a network transparent graphical user interface primarily for the UNIX Oper...
Arno Puder, Siddharth Desai
WWW
2006
ACM
15 years 10 months ago
Using web browser interactions to predict task
The automatic identification of a user's task has the potential to improve information filtering systems that rely on implicit measures of interest and whose effectiveness ma...
Melanie Kellar, Carolyn R. Watters
77
Voted
USENIX
2000
14 years 10 months ago
Integrating a Command Shell into a Web Browser
The transition from command-line interfaces to graphical interfaces has resulted in programs that are easier to learn and use, but harder to automate and reuse. Another transition...
Robert C. Miller, Brad A. Myers